{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T01:33:53.056","vulnerabilities":[{"cve":{"id":"CVE-2018-7064","sourceIdentifier":"security-alert@hpe.com","published":"2019-05-10T18:29:03.070","lastModified":"2024-11-21T04:11:35.383","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A reflected cross-site scripting (XSS) vulnerability is present in an unauthenticated Aruba Instant web interface. An attacker could use this vulnerability to trick an IAP administrator into clicking a link which could then take administrative actions on the Instant cluster, or expose the session cookie for an administrative session. Workaround: Administrators should make sure they log out of the Aruba Instant UI when not actively managing the system, and should use caution clicking links from external sources while logged into the IAP administrative interface. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0"},{"lang":"es","value":"Una vulnerabilidad de XSS reflejado está presente en una interfaz web de Aruba Instant no autenticada. Un atacante podría utilizar esta vulnerabilidad para engañar a un administrador de IAP para que haga clic en un enlace que podría realizar acciones administrativas en el clúster Instantáneo, o exponer la cookie de sesión para una sesión administrativa. Para evitarlo: Los administradores deben asegurarse de cerrar la sesión de la interfaz de usuario de Aruba Instant cuando no gestionan activamente el sistema, y deben tener cuidado al hacer clic en los enlaces de fuentes externas mientras están conectados a la interfaz administrativa de IAP. Resolución: Solucionado en Aruba Instant, versiones 4.2.4.12, 6.5.4.11, 8.3.0.6, y 8.4.0.0"}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:M\/Au:N\/C:N\/I:P\/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","versionEndExcluding":"4.2.4.12","matchCriteriaId":"EC1A7F0E-2967-4FFD-AF10-993F73B29C79"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.0","versionEndExcluding":"6.5.4.11","matchCriteriaId":"C4A8C11A-80E4-4927-8794-92AED47956E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*","versionStartIncluding":"8.3.0","versionEndExcluding":"8.3.0.6","matchCriteriaId":"3571ED0E-9E35-4B7D-80FD-DDD1FC187995"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*","versionStartIncluding":"8.4.0","versionEndExcluding":"8.4.0.1","matchCriteriaId":"E269D3DC-0DA7-4FC6-8591-E4B324F9F482"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"8.4.0.1","matchCriteriaId":"C4AB6855-E124-4F3C-9993-647B4AB1ACBF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*","matchCriteriaId":"FBC30055-239F-4BB1-B2D1-E5E35F0D8911"}]}]}],"references":[{"url":"http:\/\/www.securityfocus.com\/bid\/108374","source":"security-alert@hpe.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-549547.pdf","source":"security-alert@hpe.com","tags":["Patch","Third Party Advisory"]},{"url":"https:\/\/www.arubanetworks.com\/assets\/alert\/ARUBA-PSA-2019-001.txt","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"http:\/\/www.securityfocus.com\/bid\/108374","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-549547.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https:\/\/www.arubanetworks.com\/assets\/alert\/ARUBA-PSA-2019-001.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}